Essays about: "thesis component security"
Showing result 1 - 5 of 61 essays containing the words thesis component security.
-
1. Evaluating Connectivity for RabbitMQ stream clients in front of Load Balancers
University essay from Umeå universitet/Institutionen för datavetenskapAbstract : Message brokers play a crucial role in decoupling senders and receivers within distributed systems. In some scenarios, it is necessary to distribute a message broker across multiple nodes to form a cluster. To ensure even and fair distribution of client requests across nodes, load balancers are commonly employed in front of the cluster. READ MORE
-
2. Low-latency transport protocols inactor systems : Performance evaluation of QUIC in Kompact
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Developers widely use actor frameworks to build highly distributed systems. However, modern actor frameworks are limited in their network implementations, with Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) being the main protocols used for network communication. READ MORE
-
3. Harnessing Hydrogen and Batteries: Hybrid Energy Storage System for Versatile and Profitable Renewable Power Production
University essay from Lunds universitet/Industriell elektroteknik och automationAbstract : This thesis explores the integration of hydrogen and battery energy storage systems as a means to enhance the management of wind and solar power in the pursuit of a greener grid. The objective of the study is to identify the potential benefits and challenges associated with hybrid energy storage systems (HESS) and their role in renewable energy integration. READ MORE
-
4. The effect of human memory on password behavior : An investigation
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : Passwords are widely used as a primary method of authentication and access control, making them a critical component in safeguarding digital assets. However, individuals’ password-related behaviors, such as password selection, memorization, and management, significantly impact the security of their accounts. READ MORE
-
5. The Construction of the LVU Influence Operation : A Narrative Case Study on Influence Operations
University essay from FörsvarshögskolanAbstract : The thesis aims to give readers a more precise knowledge of how narratives in the information environment, mainly social media platforms, can be created and structured by agents of influence operations to subvert and influence a target audience. As a case study, the thesis focuses on the influence agent “Shuoun Islamiya”, as the Swedish Psychological Defence Agency pointed out, to be the initiator of the influence operation targeting Swedish Social Services and the LVU-act. READ MORE